Suggested Topics within your search.
Suggested Topics within your search.
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Language and languages 3
- Sociolinguistics 3
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- Internet in education 2
- Mobile communication systems 2
- ART / Digital 1
- African literature 1
- Anti-Infective Agents 1
- Anti-infective agents 1
- Authors, Nigerian 1
- Certification 1
- Chemotherapy 1
- Communicable diseases in children 1
- Communication in rehabilitation 1
- Computer animation 1
- Criticism and interpretation 1
- Digital cinematography 1
- Digital techniques 1
- Electronic data processing personnel 1
- Examinations 1
- Graphical user interfaces (Computer systems) 1
- Historiography 1
- History 1
- History and criticism 1
-
3521
National key information infrastructure:status,international comparison and policy recommedations
Published 2017-08-01“…2015 is the year when “the 12th Five-year Plan” fully completed,and “the 13th Five-year Plan” starts.To discover problems,judge trends and solve problems are the top priorities in the first year of planning.According to“Global Information Technology Report 2015”that released by World Economic Forum,China is also facing three weaknesses,such as the low per capita internet bandwidth,the limited mobile broadband penetration and the urgent need of innovation environment.Situation analysis and international comparison were presented,and policy recommendations were given from three major aspects,such as improving broadband capabilities,developing Aerospace integrated networks and innovative application environments,which break down into six sub-directions such as domestic broadband networks,international network layout,mobile communications,space infrastructure,application infrastructure and software-defined network.…”
Get full text
Article -
3522
Micro-station sleeping algorithm based on coverage area priority in 5G network
Published 2022-07-01“…With the maturity of 5G mobile communication technology and the rapid growth of the number of mobile terminals, the problem of intensive energy consumption of 5G wireless communication system base stations is prominent.A micro base station area hierarchical sleep algorithm was proposed.Considering the impact of micro base station load, inter station distance and inter layer cooperation on micro base station sleep, the transitions number of the micro base station in the overlapping coverage area between macro base stations is less, and the priority sleep operation has a good energy-saving effect.The simulation result shows that the energy-saving rate is 23%, which can adapt to different network sizes, and the energy-saving effect is better in large-scale networks.…”
Get full text
Article -
3523
An overview of low resolution quantization in wireless communication system
Published 2017-06-01“…Compared to the 4th generation (4G) mobile communication technology,the 5th generation (5G) mobile communication technology will provide tens of times of peak rate increase,reaching up to several thousands megabit per second.The coming wireless communication systems face the problems of expensive hardware cost and high power consumption,which is becoming a bottleneck of high-rate communication systems.To cope with these problems,redesigning communication systems with the receiver using finite precision analog-to-digital converters (ADC) is one possible approach.The analysis of recent information theory for the AWGN channel shows that the performance loss due to 2~3 bit ADC acceptable.The application of low resolution quantization in wireless communication systems was focused on,an overview of the channel capacity and receiver design under low-precision ADC was provided.…”
Get full text
Article -
3524
Les nouveaux outils de la tricherie scolaire au lycée
Published 2013-06-01“…With the arrival of mobile phones in classrooms and common use of the Internet in school activities, students have more opportunities to plagiarize documents or defraud during the tests on the table. …”
Get full text
Article -
3525
An Empirical Study on Ad Hoc Performance of DSRC and Wi-Fi Vehicular Communications
Published 2013-11-01“…Also, it identifies important effects of messages size, message frequency, weather condition, and vehicle mobility on vehicular communications. For example, rainy weather significantly diminishes the communication range and vehicle mobility causes temporal variations in communication throughput. …”
Get full text
Article -
3526
La division sexuelle du travail militant dans les assemblées générales : le cas des mouvements de « sans »
Published 2008-09-01“…This analysis leans on participating observations during unemployed mobilizations in 1998 (in Rennes and in Morlaix in Brittany) and illegal immigrant's mobilizations in the 2000s. …”
Get full text
Article -
3527
Research on service-driven network technologies for space-air-ground-sea integration
Published 2024-06-01“…Then, driven by the demand for carrying massive diverse services, key network technologies, including network slicing, mobile edge computing, and communication-sensing-computing integration, were investigated. …”
Get full text
Article -
3528
6G endogenous security:architecture and key technologies
Published 2020-01-01“…At the beginning of design for the traditional mobile communication systems,security is considered as an independent technology,relying on “patch” and “plug-in” to realize the security protection of wireless communica-tion.The sixth-generation (6G) mobile communication system is designed based on software-defined slicing platform,edge computing,artificial intelligence and big data mining to adapt to different application scenarios and performance objectives,making the traditional network security mechanisms difficult to guarantee 6G's requirements for embed-ded security.6G endogenous security was proposed,the architecture and key technologies of 6G endogenous security were described,the security threats in the new technologies were discussed which 6G would adopt,and the chal-lenges and future research directions of 6G endogenous security were provided.…”
Get full text
Article -
3529
Location privacy protection technology based on KHINN
Published 2016-09-01“…Aiming at the problem that the user’s location privacy may be leaked while users obtain location-based services,mobile terminal and LBS server the ends use k-anonymity mechanisms using the collaborative distributed model.Balanced incremental nearest neighbor (KHINN)query method based on k-anonymity was proposed.When the method structuring anonymous user group in mobile terminal,secure multiparty summation was used to calculate the anchor point to ensure user privacy;when processing the query results,SpaceTwist method based on k-anonymity was used to improve the query privacy and accuracy.Performance analysis and experimental results show that undering the condition of semi trusted or untrusted users between nodes,the proposed method can solve defects of uneven distribution of discovering points around the anchor point in SpaceTwist method and improve the accuracy of the query.…”
Get full text
Article -
3530
Green Finance in Europe — Strategy, Regulation and Instruments
Published 2021-12-01“…Abstract A green transformation of nearly all parts of our economy is necessary, including but not limited to energy production and consumption, mobility, manufacturing and agriculture.…”
Get full text
Article -
3531
STRUCTURAL ASPECTS OF PLASTICITY LOWERING OF HIGH-STRENGTH WIRE AT BIG CUMULATIVE COMPRESSIONS
Published 2012-11-01“…It is shown that decrease of plasticity of high-strength wire at big total cobbings is connected with reduction of mobility of dislocations in the substructure formed at loss of perlite lamellar structure.…”
Get full text
Article -
3532
Effect of Processing Parameters on Performance of Spray-Deposited Organic Thin-Film Transistors
Published 2011-01-01“…Our results demonstrate that we can tune the field-effect mobility of spray-deposited devices two orders of magnitude, from 10−3 cm2/Vs to 10−1 cm2/Vs, by controlling fabrication parameters.…”
Get full text
Article -
3533
Türkiye’de SMS Reklamları: Tüketici Tutumlarını Etkileyen Faktörler
Published 2009-02-01“…Mobile telefonların kullanımdaki hızlıartışhem pazarlamacılar hem de reklamcılar için yeni bir taşıma platformu yaratmıştır. …”
Get full text
Article -
3534
Observational Study of Pedestrian Behavior at Signalized Crosswalks
Published 2025-01-01“…The pedestrian behavior at five signalized crosswalks in Kielce, was analyzed in this study with a particular focus on the increasing use of mobile phones and other electronic devices while crossing the street. …”
Get full text
Article -
3535
A Novel Robust Tracking Algorithm in Cluttered Environments for Distributed Sensor Network
Published 2013-12-01“…Simulation results show that the proposed algorithm can track the mobile node and estimate the position with relatively higher accuracy in comparison with existing methods.…”
Get full text
Article -
3536
Electric Vehicles and Storage Systems Integrated within a Sustainable Urban District Fed by Solar Energy
Published 2019-01-01“…Many scenarios are analyzed and discussed, with specific attention to evaluate the role of electric mobility within a smart energy infrastructure and a focus on EVs acting as mobile storage systems.…”
Get full text
Article -
3537
Early Implant Placement with Immediate Loading in the Mandibular Anterior Region: A Rapid Solution to Edentulism
Published 2023-01-01“…On intraoral examination, there was a mobile tooth with respect to 41. The mobile tooth was extracted, and early implant placement was done along with Bio-Oss bone grafts to fill the jumping distance with no barrier membrane. …”
Get full text
Article -
3538
Las canciones del 15-M y su memoria. El sonido de un compromiso político
Published 2022-07-01“…The 15-M movement meant much more than social mobilizations against the measures imposed by the government that led to a critical situation for thousands of Spanish families. …”
Get full text
Article -
3539
La movilidad de los inmigrantes emprendedores con iniciativas culturales y creativas en la Comunidad de Madrid
Published 2018-05-01“…However, ICT facilitates new migratory flows, such as the mobility of 7entrepreneurs of art and culture. Cultural and creative industries, besides being a resource for economic mobility, are also a source of identity, create a sense of belonging and facilitate social cohesion.…”
Get full text
Article -
3540
E-k Relation of Valence Band in Arbitrary Orientation/Typical Plane Uniaxially Strained
Published 2014-01-01“…Uniaxial strain technology is an effective way to improve the performance of the small size CMOS devices, by which carrier mobility can be enhanced. The E-k relation of the valence band in uniaxially strained Si is the theoretical basis for understanding and enhancing hole mobility. …”
Get full text
Article